In this section, we will discuss how we can test the safety of SCADA systems. We have plenty of frameworks that can test SCADA systems, but considering all of them will push us beyond the scope of this book. Therefore, to keep it simple, we will continue our discussion specific to SCADA HMI exploitation carried out using Metasploit only.
Exploiting HMI in SCADA servers
Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.